Users Online

Blog Stats

Feedback

ABSTRACT

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for bluedating or bluechat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters.

Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.

Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.

If you are interested in this seminar topic, Click here to know how to get the full report.
* conditions apply

ABSTRACT

Compact discs were a revolutionary product at its time and influenced many spheres of human activity. People started recording music of high quality, which didn’t get worse with the time as it happens to be on tape. As soon as CDs appeared in computer industry they immediately became an undoubted helper both for users and for programmers. The latter were able to increase volume of their program products by adding video and audio elements etc. Later discs were used for digital video (VideoCD).

But technologies are progressing. Data are growing faster and faster. A usual CD is far not enough (640 MBytes). So, there appeared DVD technology. Of course we are happy with those 17 GBytes that can be kept on one DVD disc, but this is a limiting point. So we need a completely new method of storing information on portable data medium. And at last, the company Constellation 3D demonstrates a new format: FMD (Fluorescent Multilayer Disk), which can provide us with a staggering 140 GB of storage space seems to be an enticing solution for the storage-hungry masses.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply

ABSTRACT

The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt that must be satisfied by e-commerce protocols. This seminar shows how model checking can be used to obtain an assurance about the existence of these properties in an e-commerce protocol. It is essential that these desirable properties be satisfied, even in the presence of site or communication failure. Using the model checker we evaluate which failures cause the violation of one or more of the properties. The results of the analysis are then used to propose a mechanism that handles the failures to make the protocol failure resilient.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply

ABSTRACT

Emerging virtualization technologies are making ubiquitous access to on-demand computing, network and storage resources to deliver various applications over public Internet. In this paper we present how the telecom operation support systems (OSS) that provide Enterprise-to-Enterprise (E2E) transactions, switching management, on-demand service management and scalability have evolved to provide next generation cloud management. Fujitsu’s Social Cloud OSS provides multi-vendor, multi-network management, multi-layer Service Level Agreement (SLA) assurance, on-demand service management and impact analysis to businesses. The Social Cloud OSS service management solution for cloud computing will be the next killer application that will facilitate easy access to cloud services with appropriate SLAs and enable the society to use social networking applications that are currently being delivered using clouds.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply

ABSTRACT

Energy efficiency is a very important and challenging issue for resource-constrained mobile computers. Here, a novel dynamic software management (DSOM) framework to improve battery utilization is introduced. DSOM module is designed and implemented in user space, independent of the operating system. DSOM explores quality-of-service adaptation to reduce system energy and employs a priority based pre-emption policy for multiple applications to avoid competition for limited energy resources. Software energy macromodels for mobile applications are employed to predict energy demand at each QoS level, so that DSOM module is able to select the best possible trade-off between energy conservation and application QoS; it also honors the priority desired by the user. Experimental results on some mobile applications like video player, speech recognizer and voice-over-IP show that this approach can meet user specified task oriented goals and significantly improve battery utilization.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply

ABSTRACT

Consider a communication network where each process needs to securely exchange messages with its neighboring processes. In this network, each sent message is encrypted using one or more symmetric keys that are shared only between two processes: – the process that sends the message and the neighboring process that receives the message. A straightforward scheme for assigning symmetric keys to the different processes in such a network is to assign each process O(d) keys, where d is the maximum number of neighbors of any process in the network.
This report presents a more efficient scheme for assigning symmetric keys to the different processes in a communication network. This scheme is referred to as logarithmic keying, which assigns O(log d)symmetric keys to each process in the network. We show that logarithmic keying can be used in rich classes of communication networks that include star networks, dense bipartite networks.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply

ABSTRACT

OpenSocial is a set of APIs for building social applications that run on the web. OpenSocial’s goal is to make more apps available to more users, by providing a common API that can be used in many different contexts. Developers can create applications, using standard JavaScript and HTML, that run on social websites that have implemented the OpenSocial APIs. These websites, known as OpenSocial containers, allow developers to access their social information; in return they receive a large suite of applications for their users.
The OpenSocial APIs expose methods for accessing information about people, their friends, and their data, within the context of a container. This means that when running an application on Orkut, you’ll be interacting with your Orkut friends, while running the same application on MySpace lets you interact with your MySpace friends.

If you are you interested in this seminar topic, mail to us to get
the full report * of the seminar topic.
Mail ID: - contact4seminars@gmail.com * conditions apply